|
|
Provable Security
by Heng, Swee-Huay.
Publication:
. X, 279p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthly Global Computing
by Wirsing, Martin.
Publication:
. XII, 380p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Game Start!
by Alinovi, Francesco.
Publication:
. VII, 296 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Computer Networks and Distributed Systems Security
by Thampi, Sabu M.
Publication:
. XXI, 508 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
VLSI-SoC: Forward-Looking Trends in IC and Systems Design
by Ayala, José L.
Publication:
. X, 355p. 239 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
e-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 448 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
VLSI-SoC: Technologies for Systems Integration
by Becker, Jürgen.
Publication:
. X, 202 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
VLSI-SoC: Design Methodologies for SoC and SiP
by Piguet, Christian.
Publication:
. VIII, 287p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|